• Spoofing can be interpreted as the network security term used for forging.

    电子欺骗可以解释用于伪造网络安全术语

    youdao

  • The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.

    网络传输数据容易受到各种网络攻击例如嗅探网络传输、不可抵赖性、篡改数据、欺骗拦截捕捉回复。

    youdao

  • There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击、SQL注入蠕虫病毒

    youdao

  • Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    针对常见IP地址欺骗、IP路由欺骗、ICM P重定向欺骗、IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    youdao

  • The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users.

    如何防范校园网络流行ARP欺骗攻击,成为网络管理员用户高度关注的问题。

    youdao

  • This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.

    阐述网络协议欺骗一般原理详细分析了ICMP协议及其存在漏洞

    youdao

  • The ARP spoofing is one of the spoofing on the network, which allows an attacker to redirect the IP packets on a network segment of Ethernet so that he can get the trust of the target host.

    ARP协议欺骗网络欺骗行为之一使得攻击者可以重定向一个以太网IP数据报以取得目标主机信任

    youdao

  • Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络、网络嗅探网址嫁接

    youdao

  • The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.

    基于地址欺骗网络攻击成为当前网络安全主要威胁之一。

    youdao

  • This article recently on the network against ARP spoofing the larger object for discussion in order to attack the simulation, the host location and infection-related focus on practical tests.

    本文针对近期网络危害比较大ARP欺骗技术讨论对象攻击模拟、感染主机定位相关实践性试验等为重点

    youdao

  • According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    youdao

  • According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定